How To Secure Your Online Life? Find Your Protection Score!

How To Secure Your Online Life? Find Your Protection Score!

I am renowned for getting myself into big messes – particularly in the kitchen when I’m cooking up a storm. And I’m totally fine being alone: chopping, stirring and baking until it’s time to clean up! And that’s when the overwhelm hits – I know I should clean as I cook but I never do! So, what do I do? Rally the troops! Yes siree! There’s nothing like another set of eyes or hands to…

Read More

How To Secure Your Online Life? Find Your Protection Score!

How To Secure Your Online Life? Find Your Protection Score!

I am renowned for getting myself into big messes – particularly in the kitchen when I’m cooking up a storm. And I’m totally fine being alone: chopping, stirring and baking until it’s time to clean up! And that’s when the overwhelm hits – I know I should clean as I cook but I never do! So, what do I do? Rally the troops! Yes siree! There’s nothing like another set of eyes or hands to…

Read More

Top 5 physical security threats of 2022

Top 5 physical security threats of 2022

Top 5 physical security threats of 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Snowflake launches healthcare SaaS, data marketplace and consulting services

Snowflake launches healthcare SaaS, data marketplace and consulting services

Snowflake has launched a cloud-based, data-sharing platform for the healthcare industry that integrates the company’s core data warehousing, analytics and business intelligence offerings with a data marketplace and on-demand consulting services. The Healthcare & Life Sciences Data Cloud platform was designed in response to the growing burden on the healthcare sector globally due to the coronavirus pandemic. The SaaS (software as a service) offering is an amalgamation of Snowflake’s core applications and third-party services. As…

Read More

Top 10 Reasons Cyber Defense Firms Should Hire Veterans

Top 10 Reasons Cyber Defense Firms Should Hire Veterans

Technology expert and former military intelligence officer shares insight on the valuable skills that veterans can bring to the cybersecurity industry By Bryon Kroger, Founder of Rise8   Following the onset of the global pandemic, the number of data records compromised by cyberattacks more than doubled from the year prior, from some 15,432 in 2019 to over 37,000 in 2020. Last year, in 2021, malicious cyberattacks remained a present threat as hackers attacked the Colonial…

Read More

Landmark Online Safety Bill Introduced to UK Parliament

Landmark Online Safety Bill Introduced to UK Parliament

The UK’s landmark Online Safety Bill has been introduced to Parliament today. The legislation was drafted in May last year and contained measures to tackle a range of digital harms, including child sexual abuse, terrorist material, fraud and online abuse. New obligations will be placed on social media firms and other services hosting user-generated content to prevent and remove harmful content on their platforms. These rules will be enforced by the UK’s communications regulator, Ofcom, who will…

Read More

Conversation Hijacking Soars 270% to Enable BEC

Conversation Hijacking Soars 270% to Enable BEC

Conversation hijacking attacks, which are typically a precursor to business email compromise (BEC), grew by triple-digits year-on-year in 2021, according to new data from Barracuda Networks. The security vendor’s latest Spear Phishing: Top Threats and Trends report was compiled from an analysis of millions of emails across thousands of global business customers between January and December 2021. It revealed a 270% increase in conversation hijacking, also known as vendor impersonation, in which threat actors insert themselves into existing…

Read More

Comment l’aéroport de Toronto a modernisé ses opérations informatiques en modifiant la relation client-fournisseur

Comment l’aéroport de Toronto a modernisé ses opérations informatiques en modifiant la relation client-fournisseur

Ce n’est un secret pour personne : partout au monde, les gens recherchent une expérience de voyage plus pratique et plus personnalisée. Les aéroports doivent donc s’adapter à cette évolution et répondre aux besoins du public. Voilà pourquoi l’aéroport international Pearson de Toronto s’est lancé dans une recherche qui a duré une demi-douzaine d’années — avec pour but de moderniser ses opérations et d’améliorer l’expérience passager. L’organisme a aussi utilisé une approche inusitée dans sa gestion…

Read More

How Toronto’s airport modernized its IT operations by changing the vendor relationship

How Toronto’s airport modernized its IT operations by changing the vendor relationship

It’s no secret that travelers around the world have been demanding more seamless, convenient, and personalized experiences. Consequently, airports are continually under pressure to adapt to the changing industry and meet the needs of the flying public. Understanding this, the Toronto Pearson International Airport has been on a multiyear quest to modernize its operations and improve the passenger experience. It has done so with an unusual approach to vendor management. Operated by the Greater Toronto…

Read More

Using Frameworks like MITRE ATT&CK for Cyber Defense

Using Frameworks like MITRE ATT&CK for Cyber Defense

Welcome to this week’s blog, where I’ll dive deeper into the Top 10 Cybersecurity Challenges enterprise organizations face, as found in our recently released Cybersecurity Insights Report 2022: The State of Cyber Resilience. Coming in at number eight on our “Top 10 List of the Challenges Cybersecurity Professionals Face” is the Underutilization of Frameworks to Support Investigations. What are Frameworks? Threat frameworks allow a security analyst to streamline investigations and make sense of the chaos…

Read More
1 3,168 3,169 3,170 3,171 3,172 4,083